Review on Security for Mobile Applications Using Mobile Sensors

Authors

  • Amey Shimpi  Student, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan Savitribai Phule Pune University, Pune, Maharashtra, India
  • Sanket Sakore  Student, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan Savitribai Phule Pune University, Pune, Maharashtra, India
  • Charudatta Pawar  Student, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan Savitribai Phule Pune University, Pune, Maharashtra, India
  • Sejwal Lad  Student, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan Savitribai Phule Pune University, Pune, Maharashtra, India
  • Prof. Yogesh Thorat  Professor, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan Savitribai Phule Pune University, Pune, Maharashtra, India

Keywords:

Mobile Sensors, Android Application, Security Questions, Password Generation

Abstract

In todays growing world of technology more and more mobile applications are getting developed day by day and with the increased growth of application the threats for user’s accounts present in the applications being hacked by hackers is also increasing at a great rate. The proposed system focuses on increasing the privacy of mobile application when the user forgets the password by asking security questions based on user’s daily activity and even at the time of password generation it provides newly introduced advance feature to set new password. Security questions asked by the system to user are based on the inbuilt mobile sensors which trace the user’s location and call logs and deals with many other sensors present in the android mobile devices to authenticate the answers given by the user for the questions asked by system.

References

  1. Peng Zhao, Kaigui Bian, Tong Zhao, Xintong Song, Jung-Min “Jerry” Park, Xiaoming Li, Fan Ye, Wei Yan, Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions, pp.99, 2016.
  2. M. Oner, J. A. Pulcifer-Stump, P. Seeling, and T. Kaya, Towards the run and walk activity classification through step detection-an android application, in EMBC. IEEE, 2012, pp. 1980–1983.
  3. R. Reeder and S. Schechter, When the password doesn’t work: Secondary authentication for websites, S & P., IEEE, vol. 9, no. 2, pp. 43–49, March 2011.
  4. S. Schechter, A. B. Brush, and S. Egelman, It’s no secret. Measuring the security and reliability of authentication via secret questions, in S & P., IEEE. IEEE, 2009, pp. 375–390.
  5. H. Kim, J. Tang, and R. Anderson, Social authentication: harder than it looks, in Financial Cryptography and Data Security. Springer, 2012, pp. 1–15.

Downloads

Published

2019-10-30

Issue

Section

Research Articles

How to Cite

[1]
Amey Shimpi, Sanket Sakore, Charudatta Pawar, Sejwal Lad, Prof. Yogesh Thorat, " Review on Security for Mobile Applications Using Mobile Sensors, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 8, pp.25-28, September-October-2019.